Ransomware and HPC: HPCsec looks at some key considerations for protecting your HPC environment and supercomputers from ransomware
Guidance on securing a BeeGFS installation.
We take a look at the HPE Cray EX supercomputer platform from a security perspective.
Severity: CVSS 9.6 (Critical)
This advisory details two closely related vulnerabilities affecting versions of Spectrum LSF which can allow an adversary to gain root access to a cluster.
Exploit code enabling a user to gain root access to a system running vulnerable versions of Spectrum Scale (GPFS) surfaced online. We've undertaken an analysis of this exploit code and written a safe script that you can use to check if your Spectrum Scale installation is vulnerable as well as some best practice advice for securing your installation.
HPCsec took a look at whether the recent critical vulnerabilities in IBM Websphere (CVE-2020-4448 + CVE-2020-4450) affect Spectrum Scale GUI users
What security questions should you be asking during your next HPC/Supercomputer procurement?
A vulnerability exists in a default
installation of BeeGFS which allows users to perform operations which allow them to elevate their privileges and become root. This is due to a failure to properly authenticate a user when performing filesystem operations.
CVE-2019-14287 is a vulnerability affecting versions of sudo < 1.8.28 which can allow users with sudo privileges to circumvent restrictions and become root.
This post is a worked example of exploiting this vulnerability.
HPCsec have identified a vulnerability in PBS Pro which allows for arbitrary code execution on any node running the pbs_mom service. This vulnerability can be exploited by anyone in a position to communicate with the pbs_mom service from an authorized node within the cluster. Exploitation of this issue allows for arbitrary code execution as any other user including as root, even in installations where root is not permitted to submit jobs.
The reality is that, despite it being a requirement of most HPC customers, HPC vendors are not doing a lot when it comes to security when there is a lot of opportunity to leverage this to differentiate.
Good security is about dissecting something in order to understand how it works and then looking for ways to manipulate in order to facilitate unintended functionality. As long as that principle exists security can apply within any environment.
A vulnerability was identified within IBM Spectrum LSF which made it was possible to impersonate other users when submitting jobs for execution. Additionally, it was found to be possible to impersonate and execute jobs as root, even where root job submission is disabled.
An insecure update mechanism on DDN SFA devices allows for privilege escalation to root.
DDN SFA devices have default SSH keys in place which can be used to gain access.
A command injection vulnerability in GPFS / Spectrum Scale allows attackers to escalate privileges to root
The VX binary on SGI ICE-X supercomputers can be used to escalate privileges to root.
It is possible for users of ICE-X supercomputers to gain access to backups of system configuration databases.
It is possible to bypass authentication within Moab in order to impersonate and run commands/operations as arbitrary users. The issue is believed to affect all versions of Moab prior to versions 7.2.9 and Moab 8.
Moab provides two methods to authenticate messages sent by users (e.g. job submissions). The default scheme which is widely used is insecure and can be circumvented in order to impersonate other users and perform operations on their behalf.